Explore more training resources from Larry Ricker and the LX Labs team
Alissa Knight talks API security, formjacking and hacking
Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcoming book.
Transitioning from DevOps to DevSecOps
DevOps is essentially the combination of software development and IT operations, and it is found in many enterprise environments. We are going to find out how you can transition into DevSecOps and how you can leverage your skills and apply them to this important role.
Vulnerable Web Apps (From OWASP And Others)
Web application attacks significantly contribute to the breaches and various other cyberattacks. We will go through some of the existing vulnerable web applications that can be used to identify and exploit web application vulnerabilities.
32 hardware and firmware vulnerabilities
We give a breakdown of the 32 most commonly exploited hardware and firmware vulnerabilities. If any of these relate to systems or devices that are under your jurisdiction, it’s extremely important that you take steps to plug these holes before disaster strikes.
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.